Figure 4 - uploaded by Ajeet Ram Pathak
Content may be subject to copyright.
Response Time Graph  

Response Time Graph  

Source publication
Conference Paper
Full-text available
Due to advancement in cloud computing technology and significant growth in database technology, Database as a Service (DBaaS) has become the breakaway technology of the recent era. It is the paramount solution for managing and administering the outsourced databases. Though the users are availed through the database services, the security of databas...

Similar publications

Article
Full-text available
In this thesis we discuss how one can derive the quantum spectral curve for the $\eta$-deformed AdS$_5 \times S^5$ superstring, an integrable deformation of the AdS$_5 \times $S$^5$ superstring with quantum group symmetry. This model can be viewed as a trigonometric version of the AdS$_5 \times $S$^5$ superstring, like the Heisenberg xxz spin chain...

Citations

... Another advantage of using cloud is you can work at scale and still stay secure as it is less vulnerable to various threats. Aspects of confidentiality and integrity for outsourced databases have been scrupulously analyzed in our previous work [2][3][4][5]. We found that providing security to the text is not the only concern, and therefore, we aim to provide security in cloud computing scenario which focuses on multiple file formats, i.e., jpg, pdf, png, etc. ...
Chapter
File security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, or destruction of files stored on a database. Nowadays, security has become a very challenging issue, as the number of attacks on cyber security has increased which has affected the confidentiality, authentication, integrity, and availability of files. Here, we are assuring confidentiality and integrity aspects. To cope up with today’s security demands, we propose a secure method to provide security to all types of file formats using AES (Rijndael) and Base64 encoding, which will be later stored on MySQL database server in cloud. After thorough research, we did not find a framework which provides dynamic encryption. The model consists of three layers. First layer performs encoding and encryption. The critical aspect of using Base64 is for encoding binary data into ASCII text which can be encrypted, stored, and transmitted. Hereafter, the encoded data is encrypted by AES (Rijndael) algorithm. Second, the encrypted file is stored into MySQL Server, and finally in third step processing is done through cloud, which protects the critical information from larceny, data leakage, and deletion, thereby providing a total of three security layers.
... Database outsourcing refers to outsourcing the database on cloud for managing, storing, and administering the data by cloud service provider (CSP) and let data owners focus on business logic [2]. Due to powerful resources and services offered by cloud, data owners opt to host data at cloud's site. ...
Chapter
Due to overwhelming advancement in sensor networks and communi- cation technology, Internet of Things is taking shape to help make our lives smarter. Devices working on Internet of Things are responsible for generating multifarious and mammoth data. In addition to this, academia, business firms, etc., add vast amount of data to the pool of storage systems. This data are big data. Cloud computing provides paramount solution to store and process this big data through database outsourcing, thus reducing capital expenditure and operational costs. As big data are hosted by third party service providers in the cloud, security of such data becomes one of the significant concerns of data owners. The untrustworthy nature of service providers does not guarantee the security of data and computation results. This necessitates the owners to audit the integrity of data. Therefore, integrity auditing becomes the part and parcel of outsourced big data. Maintaining confidentiality, privacy, and trust for such big data are sine qua non for seamless and secure execution of big data-related applications. This paper gives a thorough analysis of integrity auditing protocols applied for big data residing in cloud environment.
... The IoT oriented data is confronted with following issues which forms the motivation of devising DAPs. These issues include diverse data types, large data sets, integration of varied databases, data mining and knowledge discovery, batch analytics and real time analytics, semantic interoperability, data semantics, data sharing, anomaly detection of data and sensor nodes, time-space correlation of data, efficient query processing, horizontal scalability, quality of service, integration with cloud services, multi-tenancy, security and privacy of data [17], [18]. ...
Conference Paper
Due to wide availability of programmable, off-the-shelf sensors and advancements in Radio Frequency Identification Technologies as well as Wireless Sensor Networks, the Internet of Things (IoT) is making our lives smarter than ever before. The abundant growth in sensors triggers the spontaneous generation of IoT data at colossal scale which is referred to as big data. Processing, analyzing this data in a secure, timely and efficient manner has become the sine qua non for the successful working of IoT paradigm and thereby emanating the need of Data Analytic Platforms in IoT based smart systems. The data analytic platform performs analytics over massive data and provides crucial baseline for decision and planning in the IoT sphere. The fully matured cloud computing technology best fit the scenario of IoT and big data analytics offering powerful resources to carry out analytical and management tasks. The paper focuses on various big data analytic platforms for IoT in cloud computing domain.
Chapter
Correction to: Chapter “Cloud Adoption: A Future Road Map for Indian SMEs” in: V. Bhateja et al. (eds.), Intelligent Engineering Informatics, Advances in Intelligent Systems and Computing 695, https://doi.org/10.1007/978-981-10-7566-7_51 In the original version of the book, the author names in reference 9 of chapter “Cloud Adoption: A Future Road Map for Indian SMEs” have been corrected, which is a belated correction. The correction chapter and the book have been updated with the change.
Conference Paper
Secret Sharing schemes have been used for privacy preserving data outsourcing because of the slight advantages in security and speed over encryption based schemes. Data outsourcing using secret share based scheme also result in greater fault-tolerance and data availability at the time of failures. In this paper a secret sharing scheme based on Cauchy matrix is proposed, which can be used for secure data outsourcing. The proposed scheme is compared with Shamir's scheme which is widely used for data outsourcing and it has been found that the latter performs better in share generation phase whereas the former performs better in secret reconstruction phase.